First published: Wed Oct 19 2011(Updated: )
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Django | <=1.2.6 | |
Djangoproject Django | =1.2.5 | |
Djangoproject Django | =0.95 | |
Djangoproject Django | =1.0 | |
Djangoproject Django | =1.3 | |
Djangoproject Django | =1.1.2 | |
Djangoproject Django | =1.0.1 | |
Djangoproject Django | =1.1 | |
Djangoproject Django | =1.2.1 | |
Djangoproject Django | =1.2.4 | |
Djangoproject Django | =0.91 | |
Djangoproject Django | =1.0.2 | |
Djangoproject Django | =1.2.3 | |
Djangoproject Django | =1.3-alpha1 | |
Djangoproject Django | =1.1.3 | |
Djangoproject Django | =1.2.1-2 | |
Djangoproject Django | =1.2 | |
Djangoproject Django | =0.95.1 | |
Djangoproject Django | =0.96 | |
Djangoproject Django | =1.3-alpha2 | |
Djangoproject Django | =1.1.0 | |
Djangoproject Django | =1.2.2 | |
pip/Django | >=1.3<1.3.1 | 1.3.1 |
pip/Django | >=0<1.2.7 | 1.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.